Ubuntu: 1581-1: Ghostscript vulnerability
(Sep 24) Ghostscript could be made to crash or run programs as your login if itopened a specially crafted file.
(Sep 24) Ghostscript could be made to crash or run programs as your login if itopened a specially crafted file.
(Sep 27) Applications using libxml2 could be made to crash or run programs as yourlogin if they opened a specially crafted file.
(Sep 27) Emacs could be made to run programs as your login if it opened a speciallycrafted file.
(Sep 28) USN-1551-1 introduced regressions in Thunderbird.
The update delivers Major Security fixes on Linux, package update for PHP 5.3.17 and phpMyAdmin 3.5 on Windows.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
(Sep 26) Several vulnerabilities have been discovered in Iceape, an internet suite based on Seamonkey. The reported vulnerabilities could lead to the execution of arbitrary [More…]
(Sep 26) Several vulnerabilities were discovered in Tiff, a library set and tools to support the Tag Image File Format (TIFF), allowing denial of service and potential privilege escalation. [More…]
(Sep 25) RubyGems could be made to download and install malicious gem files.
(Sep 25) Several security issues were fixed in ruby1.9.1
The update delivers Major Security fixes on Linux, package update for PHP 5.3.17 and phpMyAdmin 3.5 on Windows.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
I’m excited to announce the availability of WordPress 3.5 Beta 1. This is software still in development and we really don’t recommend that you run it on a production site — set up a test site just to play with the new version. To test WordPress 3.5, try the WordPress Beta Tester plugin (you’ll want “bleeding edge nightlies”). Or you can download […]
The Joomla! Project is pleased to announce the immediate availability of Joomla 3.0.0. This is the next major release of the Joomla CMS in the Standard Term Support (STS) track. All 3.0 users will need to plan to update to the new versions available in the STS release cycle every six months until version 3.5 is released. These updates are expected to be simple and backwards compatible.
The standard-term releases are designed for users who need access to the new features. Most users with existing 2.5.x sites will not want to update to version 3.0. Users creating new sites can use either version 2.5 or 3.0, depending on which best suits their needs. Please consider the availability of third-party templates and extensions when deciding which Joomla version to use. Also, if you decide to use version 3.0, please be aware that you will need to update your site every six months (to 3.1, 3.2, and so on) until version 3.5 is available. These updates are expected to be simple and backwards compatible.
Version 2.5 of the Joomla! CMS is a Long Term Support (LTS) release and support for it will continue until shortly after the release of Joomla 3.5, scheduled for Spring 2014. Users on version 2.5 do not need to migrate to Joomla 3.0.
Support for Joomla 1.5 will end shortly after the release of Joomla 3.0. It is currently supported only for security issues.
Yes. Any update issues will be a top priority and will likely be resolved early in the 3.x release train. However, it is likely that many templates and extensions for Joomla 2.5 will need modification to work with Joomla 3. Always test prior to migrating and consult with the developers of any extensions and templates you use. Be aware that the technical requirements for running Joomla 3.0 are different. In addition to requiring newer versions of software, certain settings that were once recommmened are now required such as requiring that magic quotes is off. See the Technical Requirements page for the specifications. See the Joomla 3.0.0 Post-Release FAQs for more detailed information about updating from 2.5 to 3.0.
This release also includes the current version (12.2) of the Joomla! Platform, which includes a large number of new and improved packages.
New Installations: Click here to download Joomla 3.0.0 (Full package) »
See the Download page for other packages and information on updating.
Note: Please read the Joomla 3.0 FAQ and the update instructions before updating.
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Please note that you should always backup your site before upgrading.
Check the Joomla 3.0.0 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during this last release cycle include: Aaron Wood, Andrea Tarr, Bill Richardson, Brian Teeman, Christophe Demko, Dean Clarke, Dennis Hermacki, Elin Waring, Emerson Rocha Luiz, Harald Leithner, Itamar Elharar, Jacob Waisner, James Brice, Janich Rasmussen, Jean-Marie Simonet, Kevin Griffiths, Loyd Headrick, Marijke Stuivenberg, Marius van Rijnsoever, Mark Dexter, Matt Thomas, Michael Babker, Neil McNulty, Nicholas Dionysopoulos, Nick Savov, Nikolai Plath, Ofer Cohen, Peter Wiseman, rachmat wakjaer, Radek Suski, rob clayburn, Roland Dalmulder, Rouven Weßling, Rune Sjøen, Samuel Moffatt, Shaun Maunder, Soheil Novinfard, Troy Hall, Viet Vu.
Bug Squad Leadership: Mark Dexter, Coordinator; Elin Waring and Marijke Stuivenberg, Team Leaders.
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Bill Richardson, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Jeremy Wilken, Marijke Stuivenberg, Mark Dexter, Michael Babker, Rouven Weßling, Samuel Moffatt.
The great news is you don’t have to be a developer to help build Joomla. The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email the Bug Squad coordinator.
You can also help Joomla development by thanking those involved in the many areas of the process. Since the release of Joomla 2.56, a whopping 4915 issues have been fixed by the JBS. The project also wants to thank all of the people that have taken the time to prepare and submit work to be included in Joomla 3.0, and to those that have worked very hard on the Joomla Platform project.
If you are an extension developer, please make sure you subscribe to the general developer mailing list as this is a place where you can discuss extension development and news that may affect custom development will be posted from time to time.
Following is a list of previous news and information about Joomla 3.0 and other sites of interest:
This release is the result of thousands of hours of work by dozens of volunteers. Thank you so very much for making Joomla the best CMS on the planet!
(Sep 26) A regression in the SIP handling code was found in DSA-2550-1. For the stable distribution (squeeze), this problem has been fixed in version 1:1.6.2.9-2+squeeze8. [More…]
(Sep 24) Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian. [More…]
(Sep 26) FreeRADIUS could be made to crash or run programs if it receivedspecially crafted network traffic.
(Sep 26) Transmission could be made to expose sensitive information over thenetwork.
(Sep 25) Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
(Sep 21) Several security issues were fixed in the kernel.
(Sep 21) Several security issues were fixed in the kernel.
(Sep 23) Glen Eustace discovered that the ISC DHCP server, a server for automatic IP address assignment, is not properly handling changes in the expiration times of a lease. An attacker may use this flaw to crash the service and cause denial of service conditions, by reducing the expiration time [More…]
(Sep 21) Several security issues were fixed in the kernel.
(Sep 21) Several security issues were fixed in the kernel.
(Sep 17) Updated openjpeg packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More…]
(Sep 17) Updated spice-gtk packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
Enterprise Monitor product. You can subscribe to RSS or Atom feeds, linked from this page, to
The 11.0.9 MU#15 update delivers IceWarp 10.3 / 10.4 support and complete fix for the issue with SERVER_PORT when Nginx is installed.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
(Sep 18) Several security issues were fixed in the kernel.
(Sep 18) Several security issues were fixed in the kernel.
(Sep 18) Updated libxml2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
(Sep 18) Updated java-1.7.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
58 queries. 8.75 mb Memory usage. 1.128 seconds.